The week in breach news

This week: The Salesforce exploit reaches Google, a BEC attack costs the City of Baltimore $1.5 million and get insight into the upcoming Microsoft Teams security upgrades expected this month.

North America

Google

Industry: Technology Exploit: Phishing

Google warned its 2.5 billion Gmail users to strengthen account protections following a just announced June 2025 data breach involving one of its third-party Salesforce systems.

The breach, linked to the extortion group ShinyHunters, occurred after attackers successfully executed a vishing attack to trick an employee into granting them access.  The bad actors then infiltrated a corporate Salesforce instance containing contact information and sales notes for small and midsize businesses.

Google stressed that the incident did not expose users’ financial data. The company also claims the compromised information was limited to business names and contact details, much of it already public.

ShinyHunters also recently conducted similar attacks on several other major corporations using the Salesforce exploit, including TransUnion this week and Farmers Insurance last week.

Source

How it could affect your business

The breach highlights growing risks from social engineering tactics targeting large enterprises and their third-party systems.

North America

The City of Baltimore

Industry: Government & Public Sector Exploit: Business Email Compromise

The City of Baltimore lost more than $1.5 million to a business email compromise (BEC) scam after a fraudster tricked employees into changing a contractor’s bank account information.

Investigators just announced that in December 2024, an unspecified attacker submitted a fraudulent supplier contact form using the name of a legitimate company employee to gain access to the vendor’s Workday account. The impersonated individual did not have access to financial systems, and the email provided was not company-issued. Still, an accounts payable employee failed to verify the identity with the vendor.

The fraudster submitted multiple requests to switch bank account details, which were approved by two employees. Baltimore then made two payments in February and March 2025, one for $800,000 and another for $721,000. The city recovered the smaller payment after the recipient’s bank flagged suspicious activity.

This marks at least the third vendor fraud incident to strike Baltimore’s government since 2019.

Source

How it could affect your business

Without regular security awareness training, employees may miss red flags that lead to expensive and embarrassing fraud incidents.

North America

TransUnion

Industry: Finance Exploit: Hacking

TransUnion disclosed a data breach impacting nearly 4.5 million people, according to a filing with the Maine Attorney General’s Office. The incident occurred on July 28, 2025 and was discovered two days later.

Hackers gained access through a third-party app used in TransUnion’s consumer support operations, although the company said its core credit database was not compromised. Stolen data includes names, birthdates, Social Security numbers, contact details, transaction reasons and support messages.

Attackers claim to have taken over 13 million records, with 4.4 million tied to U.S. consumers. The breach is linked to a wave of Salesforce-related attacks, reportedly led by the extortion group ShinyHunters, which exploited malicious integrations to steal sensitive records across multiple industries.

Source

How it could affect your business

Supply chain security is critical. Organizations must vet, secure and regularly audit the apps connected to their environments.

European Union

Auchan

Industry: Retail Exploit: Hacking

French retail giant Auchan disclosed a cyberattack that compromised the loyalty accounts of several hundred thousand customers, according to a report by Agence France-Presse (AFP).

The stolen data includes names, email and postal addresses, phone numbers and loyalty card numbers, the company confirmed. Auchan stressed that no banking details, passwords or loyalty card PIN codes were exposed.

The company said the incident has been contained and that affected customers, along with France’s data watchdog CNIL, have been notified. Belgian customer information may also have been impacted.

Source

How it could affect your business

Loyalty programs are valuable targets for cybercriminals because they hold rich personal data, even if financial details aren’t included.

North America

Manpower

Industry: Business Services Exploit: Hacking

Milwaukee-based ManpowerGroup confirmed a data breach affecting 144,189 people at one of its Lansing, Mich., franchises. The incident, which occurred between December 29, 2024, and January 12, 2025, involved a ransomware attack that exfiltrated client personal information.

While Manpower confirmed names and basic personal details were compromised, the attackers claim to have obtained more sensitive data, including passport scans, Social Security numbers, financial records and HR analytics.

Source

How it could affect your business

Third-party vendors can create major cybersecurity risks for organizations, especially when they handle sensitive data.

European Union

Miljödata

Industry: Technology Exploit: Ransomware & Malware

A ransomware attack on Miljödata, a software provider serving a large number of Sweden’s municipalities, has affected around 200 organizations,

Miljödata’s systems, including its Adato platform, manage municipal operations related to long-term sick leave, work-related injuries and other HR functions. Karlstad University said it was notified of the attack on Monday, August 25. While its own IT systems appear secure, personal data shared with Adato may have been exposed.

Swedish police reported that attackers demanded a ransom of 1.5 bitcoins (approximately 1.5 million Swedish korenor or US $165,000) from Miljödata.

Source

How it could affect your business

Sensitive data shared with external providers can be exposed, making it essential to take care to minimize shared data.

North America

Health Services LLC

Industry: Healthcare Exploit: Hacking

Health Services LLC, a franchise operator of Miracle Ear, announced a data breach potentially affecting up to 90,133 individuals

The security incident was identified on January 28, 2025, following detection of suspicious network activity. A forensic investigation revealed that an unauthorized actor had accessed the company’s network between January 2 and January 28, 2025.

A data review completed on May 14, 2025, confirmed that the exposed information included full names, phone numbers, email and postal addresses, dates of birth, patient ID numbers, Social Security numbers and health insurance information. Diagnosis and treatment details were also snatched. Health Services LLC is notifying affected individuals and taking steps to secure its systems.

Source

How it could affect your business

Continuous network monitoring is vital for quickly detecting suspicious activity, reducing a hacker’s dwell time and limiting its ability to do damage.

Like what you're reading?

Subscribe now to get security news and information in your inbox every week

Upcoming webinars & events

Unlock the benefits of rapid threat response with CDR and vPenTest’s AI-enhanced Executive Summary feature.

The CDR Advantage: Rapid Responses to Ever-Evolving Threats

September 11, 2025 11:00 AM BST

Discover how cloud detection and response (CDR) helps IT professionals rapidly detect, block and remediate evolving SaaS threats.

Register Now

AI-Powered vPenTest Reporting: Turn Technical Findings into Business Insights

September 17, 2025 2:00 PM EST

Learn how to use vPenTest’s AI-enhanced executive summary to present test findings that give executives and stakeholders a clear view of their security posture.

Register Now

Archives

Categories